Semantic Scholar uses AI to extract papers important to this topic.
This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular… Expand Protocols for deniable authentication achieve seemingly paradoxical guarantees: upon completion of the protocol the receiver is… Expand In this article, we propose a deniable electronic voting authentication protocol for mobile ad hoc networks, which meets the… Expand We extend the definitional work of Dwork,Naor and Sahai from deniable authentication to deniable key-exchange protocols. We then… Expand Deniable authentication protocol is a new technique of modern cryptography, and several such schemes have been proposed. However… Expand Deniable Authentication protocols allow a Sender to authenticate a message for a Receiver, in a way that the Receiver cannot… Expand Abstract An efficient and non-interactive deniable authentication protocol is presented to enable a receiver to identify the… Expand Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems… Expand Consider a CIA agent who wants to authenticate herself to a server but does not want to reveal her CIA credentials unless the… Expand Digital Signatures enable authenticating messages in a way that disallows repudiation. While non-repudiation is essential in some… Expand